SlideShare a Scribd company logo
SECURE
K
NO
W
LEG
E
AND
CLUSTER
BASED
INTRUSIO
N
DETECTIO
N
M
ECH
ANISM
FO
R
SM
ART
W
IRELESS
SENSO
R
NETW
O
RK
ABSTRACT
Wireless sensor networks, due to their nature, are more
prone to security threats than other networks. Developments in WSNs
have led to the introduction of many protocols specially developed for
security purposes.
Most of these protocols are not efficient in terms of
putting an excessive computational and energy consumption burden on
small nodes in WSNs. This paper proposes a knowledge-based context-
aware approach for handling the intrusions generated by malicious
nodes.
CONT..
The system operates on a knowledge base, located at the
base station, which is used to store the events generated by the nodes
inside the network. The events are categorized and the cluster heads
(CHs) are acknowledged to block maliciously repeated activities
generated.
The CHs can also get informational records about the
maliciousness of intruder nodes by using their inference engines.
The mechanism of events logging and analysis by the base
station greatly affects the performance of nodes in the network by
reducing the extra security-related load on them
INTRODUCTION
The Wireless sensor networks (WSNs) are infrastructure-
less, distributed and dynamic in nature . The in richness capabilities of
the WSN change to area of emergence technologies. Fog computing has
an excellent example.
In order to satisfying mobility support, geo distribution,
locational awareness, and to low latency needs for the IoT applications,
the Fog node facilitates the user in the execution of IoT applications .
Due to the vulnerable nature of WSNs, these networks are
always exposed to severe types of threats which can vitiate their whole
functionality.
CONT..
Authentication protocols and secure routing protocols
implement the use of cryptographic keys to ensure secure transmission
of data but cannot give protection against the inside attacks knows as
passive attacks . These protocols scramble.
The valuable data from intruders who try to access them
from outside, but a passive attack from a node inside cannot be
avoided. According to Mehmood et al. [2], there are different types of
possible attacks on WSNs like routing attacks, Sybil attacks and denial
of service (DoS) etc.
EXISTING SYSTEM
Scalability issues, and knowledge sharing, and limited resources.
These challenges need to be carefully managed through optimized
algorithms, efficient resource allocation, and robust security protocols
 Drawback
 Resource allocation
 Data loss
 Message authentication not secure
PROPOSED SYSTEM
Proposes a knowledge-based context-aware approach for handling the intrusions
generated by malicious nodes. The system operates on a knowledge base, located at
the base station, which is used to store the events generated by the nodes inside the
network.
The events are categorized and the cluster heads (CHs) are acknowledged to
block maliciously repeated activities generated.
The CHs can also get informational records about the maliciousness of intruder
nodes by using their inference engines. The mechanism of events logging and analysis
by the base station greatly affects the performance of nodes in the network by
reducing the extra security-related
MODULES:
 The sensor nodes
 CHs are selected nodes
 The monitored data
 Security alerts.
The sensor nodes
The sensor nodes are installed in the network and grouped
together into clusters according to their locations and similarities.
CONT…
CHs are selected nodes
The CHs are selected among the nodes in the respective
clusters under some criteria. A blank knowledge base is installed on the
base station.
The CHs are provided with the inference engines for
using the knowledge base on the base station.
The CHs monitor all the node-related events and data
transmission in their clusters in such a way that all the nodes
communicate through their CH, directly or indirectly.
CONT..
The monitored data :
The monitored data is considered as events and sent to the
knowledge base on the base The base station analyzes the data to determine the
suspiciousness of The base station eliminates redundant and routine events
from the base station.
Security alerts:
The base station alerts the CHs about the pattern of threat events.
The CHs take action upon such alerts.
The CHs, upon receiving suspicious alerts, blacklist the generating
nodes and broadcast the information to their member nodes.
The CH may report some unknown event due to network conditions
which are analyzed at the base station.
REQUIREMENTS
HARDWARE REQUIREMENTS:
The hardware requirements may serve as the basis for
a contract for the implementation of the system and should therefore be
a complete and consistent specification of the whole system. They are
used by software engineers as the starting point for the system design.
It should what the system do and not how it should be implemented.
HARDWARE REQUIREMENTS:
PROCESSOR : PENTIUM IV 2.6 GHz, Intel Core 2 Duo.
RAM : 2 GB DD RAM
MONITOR : 15” COLOR
HARD DISK : 40 GB
CDDRIVE : LG 52X
KEYBOARD : WIRELESS KEYBOARD
MOUSE : WIRELESS MOUSE
REQUIREMENTS
SOFTWARE REQUIREMENTS:
The software requirements document is the specification of the system. It
should include both a definition and a specification of requirements. It is a set of what the
system should do rather than how it should do it.
The software requirements provide a basis for creating the software
requirements specification.
It is useful in estimating cost, planning team activities, performing tasks
and tracking the teams and tracking the team’s progress throughout the development
activity.
SOFTWARE REQUIREMENTS:
• Operating system : Windows 07/ XP Professional
• IDE :MS Visual studio
• Front End : .net
• Database :SQLserver
FUNCTIONAL REQUIREMENTS
A functional requirement defines a function of a software-system or its
component. A function is described as a set of inputs, the behavior, and outputs.
The proposed system is achieved by graphical pictures are used as passwords.
Graphical passwords essentially use images or representation of images as
passwords. Human brain is good in remembering picture than textual character.
user select image in our application and using shuffle button to randomly
relocate the viewport then selectfive places in that image (five click points) create
password
NON-FUNCTIONAL REQUIREMENTS
Content will be well organized. Each category of user will
have a different interface.
• The searching overhead will be drastically reduced as a result of
maintaining a separate discussion forum per subject for every class.
• Only the notifications relevant to a particular user will be delivered to the
user
DIAGRAM
DATA FLOW DIAGRAM
NETWORKS STRUCTURE AND FLOW
CONCLUSION
Provided a critical examination of the IDS on CBWSN.
It is a system designed to remotely monitor and control a security
phenomenon by detecting anomaly attacks in a WSN using an IDS
model
The authors depicted an overview of CBWSN in
terms of key research areas, optimised clustering algorithm techniques
used in the related works, and the major network architectures.
We performed a comparative analysis of IDS based
on the NSL-KDD dataset as the popular benchmark dataset that
constitutes an appropriate proportion of normal network traffic flows
with several classes of attack.

More Related Content

PDF
Lz3421532161
PDF
Lz3421532161
PPTX
Intrusion detection systems in wireless sensor networks
PPTX
Intrusion detection systems in wireless sensor networks
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
PDF
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
PDF
Distributed Intrusion Detection System for Wireless Sensor Networks
PDF
International Journal of Engineering and Science Invention (IJESI)
Lz3421532161
Lz3421532161
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Wireless Sensor Networks: An Overview on Security Issues and Challenges
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
Distributed Intrusion Detection System for Wireless Sensor Networks
International Journal of Engineering and Science Invention (IJESI)

Similar to Hybrid black chain based on authentication identified scheme (20)

PDF
Sunilkumar2017
PDF
Sunilkumar2017
PPTX
Intrusion detection system
PPTX
Black hole attack
PPT
Security in wireless sensor networks
PDF
A comparative study of physical attacks on wireless sensor networks
PDF
A comparative study of physical attacks on wireless sensor networks
PDF
A comparative study of physical attacks on wireless sensor networks
PDF
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
PDF
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
PDF
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
PDF
Denial of Service (DoS) Attacks at Network Layer in WSN
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
PPTX
Wireless_Sensor_security
PDF
G041124047
PDF
Efficient Data Aggregation in Wireless Sensor Networks
PDF
A Survey on Threats and Security schemes in Wireless Sensor Networks
PDF
The technique to detect and avoid the denial of service attacks in wireless s...
PDF
A Security Approach for Wireless Sensor Network in Agriculture Industry
Sunilkumar2017
Sunilkumar2017
Intrusion detection system
Black hole attack
Security in wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
A comparative study of physical attacks on wireless sensor networks
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
Denial of Service (DoS) Attacks at Network Layer in WSN
A wireless intrusion detection system and a new attack model (synopsis)
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Wireless_Sensor_security
G041124047
Efficient Data Aggregation in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
The technique to detect and avoid the denial of service attacks in wireless s...
A Security Approach for Wireless Sensor Network in Agriculture Industry
Ad

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Welding lecture in detail for understanding
PDF
Well-logging-methods_new................
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT on Performance Review to get promotions
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
bas. eng. economics group 4 presentation 1.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
Construction Project Organization Group 2.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Welding lecture in detail for understanding
Well-logging-methods_new................
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
R24 SURVEYING LAB MANUAL for civil enggi
Automation-in-Manufacturing-Chapter-Introduction.pdf
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Ad

Hybrid black chain based on authentication identified scheme

  • 2. ABSTRACT Wireless sensor networks, due to their nature, are more prone to security threats than other networks. Developments in WSNs have led to the introduction of many protocols specially developed for security purposes. Most of these protocols are not efficient in terms of putting an excessive computational and energy consumption burden on small nodes in WSNs. This paper proposes a knowledge-based context- aware approach for handling the intrusions generated by malicious nodes.
  • 3. CONT.. The system operates on a knowledge base, located at the base station, which is used to store the events generated by the nodes inside the network. The events are categorized and the cluster heads (CHs) are acknowledged to block maliciously repeated activities generated. The CHs can also get informational records about the maliciousness of intruder nodes by using their inference engines. The mechanism of events logging and analysis by the base station greatly affects the performance of nodes in the network by reducing the extra security-related load on them
  • 4. INTRODUCTION The Wireless sensor networks (WSNs) are infrastructure- less, distributed and dynamic in nature . The in richness capabilities of the WSN change to area of emergence technologies. Fog computing has an excellent example. In order to satisfying mobility support, geo distribution, locational awareness, and to low latency needs for the IoT applications, the Fog node facilitates the user in the execution of IoT applications . Due to the vulnerable nature of WSNs, these networks are always exposed to severe types of threats which can vitiate their whole functionality.
  • 5. CONT.. Authentication protocols and secure routing protocols implement the use of cryptographic keys to ensure secure transmission of data but cannot give protection against the inside attacks knows as passive attacks . These protocols scramble. The valuable data from intruders who try to access them from outside, but a passive attack from a node inside cannot be avoided. According to Mehmood et al. [2], there are different types of possible attacks on WSNs like routing attacks, Sybil attacks and denial of service (DoS) etc.
  • 6. EXISTING SYSTEM Scalability issues, and knowledge sharing, and limited resources. These challenges need to be carefully managed through optimized algorithms, efficient resource allocation, and robust security protocols  Drawback  Resource allocation  Data loss  Message authentication not secure
  • 7. PROPOSED SYSTEM Proposes a knowledge-based context-aware approach for handling the intrusions generated by malicious nodes. The system operates on a knowledge base, located at the base station, which is used to store the events generated by the nodes inside the network. The events are categorized and the cluster heads (CHs) are acknowledged to block maliciously repeated activities generated. The CHs can also get informational records about the maliciousness of intruder nodes by using their inference engines. The mechanism of events logging and analysis by the base station greatly affects the performance of nodes in the network by reducing the extra security-related
  • 8. MODULES:  The sensor nodes  CHs are selected nodes  The monitored data  Security alerts. The sensor nodes The sensor nodes are installed in the network and grouped together into clusters according to their locations and similarities.
  • 9. CONT… CHs are selected nodes The CHs are selected among the nodes in the respective clusters under some criteria. A blank knowledge base is installed on the base station. The CHs are provided with the inference engines for using the knowledge base on the base station. The CHs monitor all the node-related events and data transmission in their clusters in such a way that all the nodes communicate through their CH, directly or indirectly.
  • 10. CONT.. The monitored data : The monitored data is considered as events and sent to the knowledge base on the base The base station analyzes the data to determine the suspiciousness of The base station eliminates redundant and routine events from the base station. Security alerts: The base station alerts the CHs about the pattern of threat events. The CHs take action upon such alerts. The CHs, upon receiving suspicious alerts, blacklist the generating nodes and broadcast the information to their member nodes. The CH may report some unknown event due to network conditions which are analyzed at the base station.
  • 11. REQUIREMENTS HARDWARE REQUIREMENTS: The hardware requirements may serve as the basis for a contract for the implementation of the system and should therefore be a complete and consistent specification of the whole system. They are used by software engineers as the starting point for the system design. It should what the system do and not how it should be implemented.
  • 12. HARDWARE REQUIREMENTS: PROCESSOR : PENTIUM IV 2.6 GHz, Intel Core 2 Duo. RAM : 2 GB DD RAM MONITOR : 15” COLOR HARD DISK : 40 GB CDDRIVE : LG 52X KEYBOARD : WIRELESS KEYBOARD MOUSE : WIRELESS MOUSE
  • 13. REQUIREMENTS SOFTWARE REQUIREMENTS: The software requirements document is the specification of the system. It should include both a definition and a specification of requirements. It is a set of what the system should do rather than how it should do it. The software requirements provide a basis for creating the software requirements specification. It is useful in estimating cost, planning team activities, performing tasks and tracking the teams and tracking the team’s progress throughout the development activity.
  • 14. SOFTWARE REQUIREMENTS: • Operating system : Windows 07/ XP Professional • IDE :MS Visual studio • Front End : .net • Database :SQLserver
  • 15. FUNCTIONAL REQUIREMENTS A functional requirement defines a function of a software-system or its component. A function is described as a set of inputs, the behavior, and outputs. The proposed system is achieved by graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. user select image in our application and using shuffle button to randomly relocate the viewport then selectfive places in that image (five click points) create password
  • 16. NON-FUNCTIONAL REQUIREMENTS Content will be well organized. Each category of user will have a different interface. • The searching overhead will be drastically reduced as a result of maintaining a separate discussion forum per subject for every class. • Only the notifications relevant to a particular user will be delivered to the user
  • 19. CONCLUSION Provided a critical examination of the IDS on CBWSN. It is a system designed to remotely monitor and control a security phenomenon by detecting anomaly attacks in a WSN using an IDS model The authors depicted an overview of CBWSN in terms of key research areas, optimised clustering algorithm techniques used in the related works, and the major network architectures. We performed a comparative analysis of IDS based on the NSL-KDD dataset as the popular benchmark dataset that constitutes an appropriate proportion of normal network traffic flows with several classes of attack.